Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      OverDos -Powerful Multiple DoSeR

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Download:

      Hidden Content

        Give reaction to this post to see the hidden content.

      Password:

      level23acktools.com

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Powerful manager for Windows File Explorer context menu
          Overview
          Shell is a context menu extender that lets you handpick the items to integrate into Windows File Explorer context menu, create custom commands to access all your favorite web pages, files, and folders, and launch any application directly from the context menu.
          It also provides you a convenient solution to modify or remove any context menu item added by the system or third party software.
          Shell is a portable utility, so you don’t need to install anything on your PC.
          Features
              Lightweight, portable and relatively easy to use.
              Fully customize the appearance.
              Adding new custom items such as (sub-menu, menuitem and separator).
              Modify or remove items that already exist.
              Support all file system objects files, folders, desktop and taskbar.
              Support expressions syntax. with built-in functions and predefined variables.
              Support colors, glyphs, SVG, embedded icons, and image files such as .ico, .png or .bmp.
              Support search and filter.
              Support for complex nested menus.
              Support multiple column.
              Quickly and easily configure file in plain text.
              Minimal resource usage.
              No limitations.
          Requirements
          Microsoft Windows 7/8/10/11

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A project dedicated to provide DDoS protection with proof-of-work
          PoW Shield provides DDoS protection on the OSI application layer by acting as a proxy that utilizes proof of work between the backend service and the end-user. This project aims to provide an alternative to general captcha methods such as Google’s ReCaptcha that has always been a pain to solve. Accessing a web service protected by PoW Shield has never been easier, simply go to the url, and your browser will do the rest of the verification automatically for you.
          PoW Shield aims to provide the following services bundled in a single webapp / docker image:
              proof of work authentication
              ratelimiting and ip blacklisting
              web application firewall
          How it Works
          So basically, PoW Shield works as a proxy in front of the actual web app/service. It conducts verification via proof-of-work and only proxies authorized traffic through to the actual server. The proxy is easily installable and is capable of protecting low-security applications with a WAF.
          Here’s what happens behind the scenes when a user browses a PoW Shield-protected webservice:
              The server generates a random hex-encoded “prefix” and sends it along with the PoW Shield page to the client.
              Browser JavaScript on the client-side then attempts to brute-force a “nonce” that when appended with the prefix, can produce a SHA256 hash with the number of leading zero-bits more than the “difficulty” D specified by the server. i.e. SHA256(prefix + nonce)=0…0xxxx (binary, with more than D leading 0s)
              Client-side JavaScript then sends the calculated nonce to the server for verification, if verification passes, the server generates a cookie for the client to pass authentication.
              The server starts proxying the now authenticated client traffic to the server with WAF filtering enabled.
          Features
              Web Service Structure
              Proxy Functionality
              PoW Implementation
              Dockerization
              IP Blacklisting
              Ratelimiting
              Unit Testing
              WAF Implementation
              Multi-Instance Syncing (Redis)
          Changelog v2.0
              Support integration with PoW Phalanx Controller
              Update dependencies

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Logs
              NEW SPECIAL METHODS!
              NEW STRESS METHOD!
          Info
              Open Source
              Powerful
              Simple
              Methods for Layer 4 and 7
              Bypass (Cloudflare, OVH, NFO,...)
          TOS:
          Do not attack government pages (.gov/.gob), educational pages (.edu) or the United States Department of Defense (.mil),
          the creator is not responsible for the damage caused by the attacks.
          remember: you are responsible for the attacks since this tool was created for educational purposes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Global DNS allows you to instantly check the DNS records across multiple servers. It provides an insight to end users on which server website is pointing to. It is also helpful to check the current DNS entries incase the DNS records are changed.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. I clearly designed this tool for education purposes and only to understand how sockets and DDOS attacks are performed. You are accountable for your own actions!
          WARNING
              Please Do Not Attack .Gov or .Irs :)

          Hidden Content
          Give reaction to this post to see the hidden content.